Buffalo Forums

Products => Storage => Topic started by: jangiskhan on August 23, 2019, 08:40:22 AM

Title: vulnerability found in Buffalo TeraStation!!!
Post by: jangiskhan on August 23, 2019, 08:40:22 AM
I am using Buffalo TeraStation -- TS-X8.0TL/R5 model



there is 4 vulnerability found.
1.Remote User List Disclosure Using NetBIOS
2.Null Session/Password NetBIOS Access

How to fix the vulnerability
Title: Re: vulnerability found in Buffalo TeraStation!!!
Post by: 1000001101000 on August 23, 2019, 09:52:52 AM
Someone else posted about what I believe to be the same thing (they included the CVE#'s from their results).

That thread is here:
http://forums.buffalotech.com/index.php?topic=28463.msg95114#msg95114

Part of working with vulnerability scanners is reading the results and researching the specific vulnerabilities being reported and determining how to deal with them. This often involves configuration changes like changing weak passwords, removing public permissions or even disabling unneeded features.
Title: Re: vulnerability found in Buffalo TeraStation!!!
Post by: Eastmarch on September 06, 2019, 12:08:10 PM
TS-X is EOL and will likely only get truly security-shattering patches.

Those two are common and not exactly 'vulnerabilities' in the sense that unauthorized attackers can execute code on the box. Those are more a 'security hygiene' issue.
Browser ID: smf (is_webkit)
Templates: 1: Printpage (default).
Sub templates: 4: init, print_above, main, print_below.
Language files: 1: index+Modifications.english (default).
Style sheets: 0: .
Hooks called: 55 (show)
Files included: 27 - 1055KB. (show)
Memory used: 733KB.
Tokens: post-login.
Queries used: 10.

[Show Queries]